Results for 'Confidentiality'

26 found
Order:
  1.  15
    The Use of Confidentiality and Anonymity Protections as a Cover for Fraudulent Fieldwork Data.M. V. Dougherty - 2021 - Research Ethics 17 (4):480-500.
    Qualitative fieldwork research on sensitive topics sometimes requires that interviewees be granted confidentiality and anonymity. When qualitative researchers later publish their findings, they must ensure that any statements obtained during fieldwork interviews cannot be traced back to the interviewees. Given these protections to interviewees, the integrity of the published findings cannot usually be verified or replicated by third parties, and the scholarly community must trust the word of qualitative researchers when they publish their results. This trust is fundamentally abused, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. A Larger Space for Moral Reflection.Judith Andre - 1998 - Ethical Currents (53):6-8.
    Margaret Urban Walker argues that hospital ethics committees should think of their task as "keeping moral space open." I develop her suggestion with analogies: Enlarge the windows (i.e., expand what counts as an ethical issue); add rooms and doors (i.e., choose particular issues to engage). Examples include confidentiality defined as information flow, and moral distress in the healthcare workplace.
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  3. Pulcinella secrets.Emilio Mordini - 2011 - Bioethics 25 (9):ii-iii.
    Pulcinella is one of the most ancient comic characters of the Commedia dell’Arte.1 He is the stereotypical lazy servant, insolent and chauvinist, sometimes stupid, sometimes clever, always penniless, and absolutely unable to keep any secret. In a typical Commedia dell’Arte plot, the master reveals a secret to Pulcinella, who is under oath never to disclose it. Needless to say, after swearing that he will never divulge it, Pulcinella soon acts in a very different way, telling the secret to everybody he (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  4.  79
    Not the Doctor’s Business: Privacy, Personal Responsibility and Data Rights in Medical Settings.Carissa Véliz - 2020 - Bioethics 34 (7):712-718.
    This paper argues that assessing personal responsibility in healthcare settings for the allocation of medical resources would be too privacy-invasive to be morally justifiable. In addition to being an inappropriate and moralizing intrusion into the private lives of patients, it would put patients’ sensitive data at risk, making data subjects vulnerable to a variety of privacy-related harms. Even though we allow privacy-invasive investigations to take place in legal trials, the justice and healthcare systems are not analogous. The duty of doctors (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  5. Email Classification Using Artificial Neural Network.Ahmed Alghoul, Sara Al Ajrami, Ghada Al Jarousha, Ghayda Harb & Samy S. Abu-Naser - 2018 - International Journal of Academic Engineering Research (IJAER) 2 (11):8-14.
    Abstract: In recent years email has become one of the fastest and most economical means of communication. However increase of email users has resulted in the dramatic increase of spam emails during the past few years. Data mining -classification algorithms are used to categorize the email as spam or non-spam. Numerous email spam messages are marketable in nature but might similarly encompass camouflaged links that seem to be for acquainted websites but actually lead to phishing web sites or sites that (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  6. The Current State of Medical School Education in Bioethics, Health Law, and Health Economics.Govind C. Persad, Linden Elder, Laura Sedig, Leonardo Flores & Ezekiel J. Emanuel - 2008 - Journal of Law, Medicine and Ethics 36 (1):89-94.
    Current challenges in medical practice, research, and administration demand physicians who are familiar with bioethics, health law, and health economics. Curriculum directors at American Association of Medical Colleges-affiliated medical schools were sent confidential surveys requesting the number of required hours of the above subjects and the years in which they were taught, as well as instructor names. The number of relevant publications since 1990 for each named instructor was assessed by a PubMed search.In sum, teaching in all three subjects combined (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  7. Rethinking the Ethical Approach to Health Information Management Through Narration: Pertinence of Ricœur’s ‘Little Ethics’.Corine Mouton Dorey - 2016 - Medicine, Health Care and Philosophy 19 (4):531-543.
    The increased complexity of health information management sows the seeds of inequalities between health care stakeholders involved in the production and use of health information. Patients may thus be more vulnerable to use of their data without their consent and breaches in confidentiality. Health care providers can also be the victims of a health information system that they do not fully master. Yet, despite its possible drawbacks, the management of health information is indispensable for advancing science, medical care and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Embracing Change with All Four Arms: Post-Humanist Defense of Genetic Engineering.J. Hughes - 1996 - Eubios Journal of Asian and International Bioethics 6 (4):94-101.
    This paper sets out to defend human genetic engineering with a new bioethical approach, post-humanism, combined with a radical democratic political framework. Arguments for the restriction of human genetic engineering, and specifically germ-line enhancement, are reviewed. Arguments are divided into those which are fundamental matters of faith, or "bio-Luddite" arguments, and those which can be addressed through public policy, or "gene-angst" arguments.The four bio-Luddite concerns addressed are: Medicine Makes People Sick; There are Sacred Limits of the Natural Order; Technologies Always (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  9. Cunoaștere și Informații.Nicolae Sfetcu - 2019 - Drobeta Turnu Severin: MultiMedia Publishing.
    Cunoașterea și informațiile (abordate în ansamblu sau în componentele lor distincte) sunt o preocupare majoră pentru tehnologia informației, sisteme de informații, știința informației și activitatea de informații în general. Procesul obţinerii, prelucrării şi analizei informaţiilor este o preocupare majoră pentru societatea actuală. În acest scop se folosesc procedee şi tehnici specifice pentru culegerea sau generarea de informaţii, prelucrarea acestora prin analiză şi sinteză, generarea de predicţii şi strategii, transmisia şi prezentarea informaţiilor factorilor de decizie, şi stocarea lor. Analiza informațiilor poate (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark   5 citations  
  10.  41
    Review of Graeme Laurie, Genetic Privacy. [REVIEW]Donna Dickenson - 2003 - Journal of Medical Ethics 29:271-374.
    Review of Graeme Laurie, Genetic Privacy: A Challenge to Medico-Legal Norms.
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  11. The Tarasoff Rule: The Implications of Interstate Variation and Gaps in Professional Training.Rebecca Johnson, Govind Persad & Dominic Sisti - 2014 - Journal of the American Academy of Psychiatry and the Law Online 42 (4):469-477.
    Recent events have revived questions about the circumstances that ought to trigger therapists' duty to warn or protect. There is extensive interstate variation in duty to warn or protect statutes enacted and rulings made in the wake of the California Tarasoff ruling. These duties may be codified in legislative statutes, established in common law through court rulings, or remain unspecified. Furthermore, the duty to warn or protect is not only variable between states but also has been dynamic across time. In (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  74
    Privacy.Edmund Byrne - 1998 - In Encyclopedia of Applied Ethics. San Diego: Academic Press. pp. 649-659.
    Privacy involves a zone of inaccessibility in a particular context. In social discourse it pertains to activities that are not public, the latter being by definition knowable by outsiders. The public domain so called is the opposite of secrecy and somewhat less so of confidentiality. The private sphere is respected in law and morality, now in terms of a right to privacy. In law some violations of privacy are torts. Philosophers tend to associate privacy with personhood. Professional relationships are (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  13. In Two Minds: A Casebook of Psychiatric Ethics.Donna Dickenson, Bill Fulford & K. W. M. Fulford - 2000 - Oxford: Oxford University Press.
    In Two Minds is a practical casebook of problem solving in psychiatric ethics. Written in a lively and accessible style, it builds on a series of detailed case histories to illustrate the central place of ethical reasoning as a key competency for clinical work and research in psychiatry. Topics include risk, dangerousness and confidentiality; judgements of responsibility; involuntary treatment and mental health legislation; consent to genetic screening; dual role issues in child and adolescent psychiatry; needs assessment; cross-cultural and gender (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14.  22
    Professional Responsibility: A Deontological Case-Study Approach.Iñaki Xavier Larrauri Pertierra - 2019 - Solidarity: The Journal of Catholic Social Thought and Secular Ethics 8 (2):1-22.
    Kantian Deontological Ethics concerns itself with the will as grounded in universalisable maxims. Such maxims are in turn based on rationally conceived laws that, in a professional setting, find expression in the autonomously made agreements constituting professional protocols and regulations. When applied to a case-study wherein public safety has been possibly jeopardised by company products, we can argue for priority in the agreed-to responsibility towards the good of professional autonomy, expressed as a rational mandate of nondisclosure of confidential product information, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. Ethics for Records and Information Management.Norman A. Mooradian - 2018 - Chicago, IL, USA: American Library Association.
    The scope and reach of information, driven by the explosive growth of information technologies and content types, has expanded dramatically over the past 30 years. The consequences of these changes to records and information management (RIM) professionals are profound, necessitating not only specialized knowledge but added responsibilities. RIM professionals require a professional ethics to guide them in their daily practice and to form a basis for developing and implementing organizational policies, and Mooradian’s new book provides a rigorous outline of such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Big Data Ethics in Research.Nicolae Sfetcu - manuscript
    The main problems faced by scientists in working with Big Data sets, highlighting the main ethical issues, taking into account the legislation of the European Union. After a brief Introduction to Big Data, the Technology section presents specific research applications. There is an approach to the main philosophical issues in Philosophical Aspects, and Legal Aspects with specific ethical issues in the EU Regulation on the protection of natural persons with regard to the processing of personal data and on the free (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  43
    Beginner's Guide for Cybercrime Investigators.Nicolae Sfetcu - 2014 - Drobeta Turnu Severin: MultiMedia Publishing.
    In the real world there are people who enter the homes and steal everything they find valuable. In the virtual world there are individuals who penetrate computer systems and "steal" all your valuable data. Just as in the real world, there are uninvited guests and people feel happy when they steal or destroy someone else's property, the computer world could not be deprived of this unfortunate phenomenon. It is truly detestable the perfidy of these attacks. For if it can be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Use of Blockchain in Strengthening Cybersecurity And Protecting Privacy.Arif Sari - 2018 - International Journal of Engineering and Information Systems (IJEAIS) 2 (12):59-66.
    Abstract—The purpose of this study is to highlight and prove the positive impact in which blockchain could have on today’s IoT environment in terms of providing Cybersecurity for not just organizations, but other individuals who share data via the internet. The current IoT environs operates on a centralized cloud based server, meanwhile block chain operates on a decentralized server. The differentiation between the both plays a major role in the level of security they both provide; whereby, decentralized systems are less (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  58
    Does Organizational Silence in NGOs Affected by Job Burnout?Hany Tharya, Esmail Kassim, Youssef Abu Amuna & Abedallh Aqel - 2021 - International Journal of Academic Management Science Research (IJAMSR) 5 (5):31-40.
    This study aimed to identify job burnout and its impact on organizational silence through an applied study on employees in NGOs in southern governorates, Palestine. NGOs might be not focused as community for researchers according to their missions nature, but employees are humans even they work in private, public, or NGOs. Job burnout old phenomenon widespread mostly in public and private sectors. Job burnout and organizational silence in NGOs were not discussed widely. Researchers used questionnaire as a main tool for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Afro-Communitarianism and the Role of Traditional African Healers in the COVID-19 Pandemic.Luís Cordeiro-Rodrigues & Thaddeus Metz - 2021 - Public Health Ethics 14 (1):59-71.
    The COVID-19 pandemic has brought significant challenges to healthcare systems worldwide, and in Africa, given the lack of resources, they are likely to be even more acute. The usefulness of Traditional African Healers in helping to mitigate the effects of pandemic has been neglected. We argue from an ethical perspective that these healers can and should have an important role in informing and guiding local communities in Africa on how to prevent the spread of COVID-19. Particularly, we argue not only (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Culture, Actors, and Resources Surrounding Undergraduate Bioethics Education in Sub-Saharan Africa.Elizabeth R. Bruce - 2019 - International Journal of African Higher Education 5 (1).
    Scientisationisagrowingtrendasindividualsworldwideharnessscientific tools and knowledge to solve problems. This phenomenon is evident in biomedical research, which has increased across sub-Saharan Africa, and when encountering bioethical issues arising during the course of such research. This research synthesis considers how the constructs of culture, actors, and resources in the region shape undergraduate bioethics education. Using a lens of sociological neo-institutionalism, taken-for-granted bioethical scripts, like informed consent and medical confidentiality, are evident in this education; however, actual implementation demonstrates the way they are often (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  22. The Ethical Work That Regulations Will Not Do.Carusi Annamaria & De Grandis Giovanni - 2012 - Information, Communication and Society 15 (1):124-141.
    Ethical concerns in e-social science are often raised with respect to privacy, confidentiality, anonymity and the ethical and legal requirements that govern research. In this article, the authors focus on ethical aspects of e-research that are not directly related to ethical regulatory framework or requirements. These frameworks are often couched in terms of benefits or harms that can be incurred by participants in the research. The authors shift the focus to the sources of value in terms of which benefits (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23.  63
    Classification of Email Using ANN.Hareb Ghaydaa, A. Alghoul, Ajrami Ghada, Jarousha Ghaydaa & Daliah Kashef - 2016 - International Journal of Academic Engineering Research (IJAER) 2 (11):8-14.
    In recent years email has become one of the fastest and most economical means of communication. However increase of email users has resulted in the dramatic increase of spam emails during the past few years. Data mining -classification algorithms are used to categorize the email as spam or non-spam. Numerous email spam messages are marketable in nature but might similarly encompass camouflaged links that seem to be for acquainted websites but actually lead to phishing web sites or sites that are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24.  78
    Negotiating the Ethical Conduct of Educational Research in an Institutional Review Board Space: Perspectives From a University in Ethiopia.Ashenafi Alemu - 2019 - International Journal of African Higher Education 5 (1).
    Some international researchers assume that there is a lack of ethical review of research in many countries of the Global South. However, numerous African countries have recently introduced local and national research ethics guidelines. This article unpacks how ethical reviews of research in education are negotiated in a higher education institution in Ethiopia. It employs a critical analytical lens to challenge some of the assumptions of Beaty’s (2010) Institutional Review Board (IRB) stakeholder model. The article begins with a discussion of (...)
    Download  
    Translate
     
     
    Export citation  
     
    Bookmark  
  25.  35
    All of Life Is Here.Trevor Stammers - 2017 - The New Bioethics 23 (2):105-106.
    A review of the range of articles in the summer issue of The New Bioethics.
    Download  
     
    Export citation  
     
    Bookmark  
  26. Teaching Medical Ethics and Law Within Medical Education: A Model for the UK Core Curriculum.Richard Ashcroft & Donna Dickenson - 1998 - Journal of Medical Ethics 24:188-192.
    Consensus statement by UK teachers of medical ethics and law.
    Download  
     
    Export citation  
     
    Bookmark